Github.Com Grafana Grafana vulnerabilities

57 known vulnerabilities affecting github.com/grafana_grafana.

Total CVEs
57
CISA KEV
2
actively exploited
Public exploits
8
Exploited in wild
2
Severity breakdown
CRITICAL5HIGH18MEDIUM31LOW3

Vulnerabilities

Page 2 of 3
CVE-2021-43815HIGHCVSS 7.5≥ 8.0.0-beta3, < 8.3.22024-05-14
CVE-2021-43815 [HIGH] CWE-22 Grafana directory traversal for .cvs files Grafana directory traversal for .cvs files Today we are releasing Grafana `8.3.2` and `7.5.12`. This patch release includes a moderate severity security fix for directory traversal for arbitrary `.csv` files. It only affects instances that have the developer testing tool called [TestData DB data source](https://grafana.com/docs/grafana/latest/datasources/testdata/) enabled and configured. The vulnerability is limited in sc
ghsaosv
CVE-2022-21702MEDIUMCVSS 5.4≥ 2.0.0-beta1, < 7.5.15≥ 8.0.0, < 8.3.52024-05-14
CVE-2022-21702 [MEDIUM] CWE-79 Grafana proxy Cross-site Scripting Grafana proxy Cross-site Scripting Today we are releasing Grafana 8.3.5 and 7.5.15. This patch release includes MEDIUM severity security fix for XSS for Grafana. Release v.8.3.5, only containing security fixes: - [Download Grafana 8.3.5](https://grafana.com/grafana/download/8.3.5) - [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-3-5/) Release v.7.5.15, only containing security fixes: - [
ghsaosv
CVE-2022-21713MEDIUMCVSS 4.3≥ 5.0.0-beta1, < 7.5.15≥ 8.0.0, < 8.3.52024-05-14
CVE-2022-21713 [MEDIUM] CWE-639 Grafana API IDOR Grafana API IDOR Today we are releasing Grafana 8.3.5 and 7.5.14. This patch release includes MEDIUM severity security fix for Grafana Teams API IDOR. Release v.8.3.5, only containing security fixes: - [Download Grafana 8.3.5](https://grafana.com/grafana/download/8.3.5) - [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-3-5/) Release v.7.5.15, only containing security fixes: - [Download Grafana 7.5.15](htt
ghsaosv
CVE-2022-39307MEDIUMCVSS 5.3≥ 9.0.0, < 9.2.4≥ 0, < 8.5.152024-05-14
CVE-2022-39307 [MEDIUM] CWE-200 Grafana User enumeration via forget password Grafana User enumeration via forget password Today we are releasing Grafana 9.2.4. Alongside other bug fixes, this patch release includes moderate security fixes for CVE-2022-39307. We are also releasing security patches for Grafana 8.5.15 to fix these issues. Release 9.2.4, latest patch, also containing security fix: - [Download Grafana 9.2.4](https://grafana.com/grafana/download/9.2.4) Release 8.5.15, only contai
ghsaosv
CVE-2022-39229MEDIUMCVSS 4.3≥ 0, < 8.5.14≥ 9.0.0, < 9.1.82024-05-14
CVE-2022-39229 [MEDIUM] CWE-287 Grafana when using email as a username can block other users from signing in Grafana when using email as a username can block other users from signing in Today we are releasing Grafana 9.2. Alongside with new features and other bug fixes, this release includes a Moderate severity security fix for CVE-2022-39229 We are also releasing security patches for Grafana 9.1.8 and Grafana 8.5.14 to fix these issues. Release 9.2, latest release, also containing security f
ghsaosv
CVE-2022-35957MEDIUMCVSS 6.6≥ 9.1.0, < 9.1.6≥ 9.0.0, < 9.0.9+1 more2024-05-14
CVE-2022-35957 [MEDIUM] CWE-290 Grafana Escalation from admin to server admin when auth proxy is used Grafana Escalation from admin to server admin when auth proxy is used Today we are releasing Grafana 9.1.6, 9.0.9, 8.5.13. This patch release includes a Moderate severity security fix for CVE-2022-35957 that affects Grafana instances which are using Grafana [Auth Proxy](https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/auth-proxy/#configure-auth-p
ghsaosv
CVE-2022-39324MEDIUM≥ 9.0.0, < 9.2.8≥ 0, < 8.5.162024-05-14
CVE-2022-39324 [MEDIUM] CWE-79 Grafana Spoofing originalUrl of snapshots Grafana Spoofing originalUrl of snapshots To create a snapshot (and insert an arbitrary URL) the built-in role Viewer is sufficient. When a dashboard is shared as a local snapshot, the following three fields are offered in the web UI for a user to fill out: • Snapshotname • Expire • Timeout(seconds) After the user confirms creation of the snapshot (i.e. clicks the ”Local Snapshot” button) an HTTP POST request is sent to th
ghsaosv
CVE-2022-36062LOWCVSS 3.8≥ 8.5.0, < 8.5.13≥ 9.0.0, < 9.0.9+1 more2024-05-14
CVE-2022-36062 [LOW] CWE-281 Grafana folders admin only permission privilege escalation Grafana folders admin only permission privilege escalation Today we are releasing Grafana 9.1.6, 9.0.9, 8.5.13. This patch release includes a Moderate severity security fix for CVE-2022-36062 that affects Grafana instances which are using Grafana role-based access control (RBAC). Release 9.1.6, latest patch, also containing security fix: - [Download Grafana 9.1.6](https://grafana.com/grafana/download/9.1.6
ghsaosv
CVE-2024-1313HIGH≥ 9.5.0, < 9.5.18≥ 10.0.0, < 10.0.13+3 more2024-04-05
CVE-2024-1313 [HIGH] CWE-639 Grafana: Users outside an organization can delete a snapshot with its key Grafana: Users outside an organization can delete a snapshot with its key ### Summary The ***DELETE /api/snapshots/{key}*** endpoint allows any Grafana user to delete snapshots if the user is NOT in the organization of the snapshot ### Details An attacker (a user without organization affiliation or with a "no basic role" in an organization other than the one where the dashboard exists), know
ghsaosv
CVE-2024-1442HIGH≥ 8.5.0, < 9.5.7≥ 10.0.0, < 10.0.12+3 more2024-03-07
CVE-2024-1442 [HIGH] CWE-269 Grafana's users with permissions to create a data source can CRUD all data sources Grafana's users with permissions to create a data source can CRUD all data sources A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *. Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
ghsaosv
CVE-2023-6152MEDIUM≥ 2.5.0, < 9.5.16≥ 10.0.0, < 10.0.11+3 more2024-02-13
CVE-2023-6152 [MEDIUM] CWE-863 Email Validation Bypass And Preventing Sign Up From Email's Owner Email Validation Bypass And Preventing Sign Up From Email's Owner ### Summary Email validation can easily be bypassed because `verify_email_enabled` option enable email validation at sign up only. A user changing it's email after signing up (and verifying it) can change it without verification in `/profile`. This can be used to prevent legitimate owner of the email address from signing up. Another
ghsaosv
CVE-2021-43798HIGHCVSS 7.5KEVPoC≥ 8.3.0, < 8.3.1≥ 8.2.0, < 8.2.7+2 more2024-02-01
CVE-2021-43798 [HIGH] CWE-22 Grafana path traversal Grafana path traversal Today we are releasing Grafana 8.3.1, 8.2.7, 8.1.8, 8.0.7. This patch release includes a high severity security fix that affects Grafana versions from v8.0.0-beta1 through v8.3.0. Release v8.3.1, only containing a security fix: - [Download Grafana 8.3.1](https://grafana.com/grafana/download/8.3.1) - [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-3-1/) Release v8.2.7, only contain
ghsaosv
CVE-2018-12099MEDIUM≥ 0, < 5.2.0-beta12024-01-31
CVE-2018-12099 [MEDIUM] CWE-79 Grafana Cross-site Scripting (XSS) Grafana Cross-site Scripting (XSS) Grafana before 5.2.0-beta1 has XSS vulnerabilities in dashboard links.
ghsaosv
CVE-2019-19499MEDIUM≥ 0, < 6.4.42024-01-31
CVE-2019-19499 [MEDIUM] CWE-200 Grafana Arbitrary File Read Grafana Arbitrary File Read Grafana <= 6.4.3 has an Arbitrary File Read vulnerability, which could be exploited by an authenticated attacker that has privileges to modify the data source configurations.
ghsaosv
CVE-2018-18625MEDIUMCVSS 6.1≥ 0, < 6.0.0-beta12024-01-30
CVE-2018-18625 [MEDIUM] CWE-79 Grafana XSS via adding a link in General feature Grafana XSS via adding a link in General feature Grafana 5.3.1 has XSS via a link on the "Dashboard > All Panels > General" screen. NOTE: this issue exists because of an incomplete fix for CVE-2018-12099.
ghsaosv
CVE-2018-18623MEDIUMCVSS 6.1≥ 0, < 6.0.0-beta12024-01-30
CVE-2018-18623 [MEDIUM] CWE-79 Grafana XSS in Dashboard Text Panel Grafana XSS in Dashboard Text Panel Grafana 5.3.1 has XSS via the "Dashboard > Text Panel" screen. NOTE: this issue exists because of an incomplete fix for CVE-2018-12099.
ghsaosv
CVE-2023-4822MEDIUM≥ 0, ≤ 10.1.52023-10-16
CVE-2023-4822 [MEDIUM] CWE-269 Grafana privilege escalation vulnerability Grafana privilege escalation vulnerability Grafana is an open-source platform for monitoring and observability. The vulnerability impacts instances with several organizations, and allows a user with Organization Admin permissions in one organization to change the permissions associated with Organization Viewer, Organization Editor and Organization Admin roles in all organizations. It also allows an Organization Admin to
ghsaosv
CVE-2023-3128CRITICAL≥ 9.4.0, < 9.4.13≥ 9.3.0, < 9.3.16+2 more2023-06-22
CVE-2023-3128 [CRITICAL] CWE-290 Grafana vulnerable to Authentication Bypass by Spoofing Grafana vulnerable to Authentication Bypass by Spoofing Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.
ghsaosv
CVE-2023-2183MEDIUM≥ 0, < 8.5.26≥ 9.0.0, < 9.2.19+3 more2023-06-12
CVE-2023-2183 [MEDIUM] CWE-284 Grafana has Broken Access Control in Alert manager: Viewer can send test alerts Grafana has Broken Access Control in Alert manager: Viewer can send test alerts ### Summary Grafana allows an attacker in the Viewer role, send alerts by API Alert - Test. The option is not available from the user panel UI for in the Viewer role. **Reason for the error**: The API does not check access to this function and allows it by users with the least rights, for example, the View
ghsaosv
CVE-2023-2801HIGH≥ 0, < 9.4.12≥ 9.5.0, < 9.5.32023-06-06
CVE-2023-2801 [HIGH] CWE-662 Grafana Missing Synchronization vulnerability Grafana Missing Synchronization vulnerability Grafana is an open-source platform for monitoring and observability. Using public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance. The only feature that uses mixed queries at the moment is public dashboards, but it's also possible to cause this by calling the query API directl
ghsaosv